Anne-Marie Eklund Lwinder: "I was good at making others' code stop running very early on."

She’s the CISO of The Internet Foundation of Sweden (IIS) and one of 14 trusted individuals to hold a Key to the Internet, which means the DNSSEC key generation for the internet root zone. Anne-Marie Eklund Löwinder is also one of the few Swedes who have been inducted into the Internet Hall of Fame.


Poor Web Hosting and Maintenance Leads to Hacking

Many individuals feel accomplished after owning a business website; so much so that they even forget to set up security defenses around it. On the other hand, most of the people deliberately skip this step because why would hackers hack small-scale business models, right? You would be surprised to learn that 43% of hackers target small businesses. Besides, 60% of small-scale companies go out of business within six months of a cyberattack.


Beware of Phishing Scams during Amazon Prime Day

Amazon Prime Day is in full effect and so are hackers working on elaborate phishing scams targeting Amazon shoppers. Amazon announced that over one million items will be discounted on July 15 and 16, leaving bargain shoppers racing to buy. But while shoppers are busy searching for the best deals on this Prime Day, malicious actors are looking to scam. McAfee reported a popular phishing kit, 16Shop, recently shifted its attention to Amazon.


Lerhan: Bypassing IDOR protection with URL shorteners

Xavier Blasco (a.k.a Lerhan) is a 23-year old security researcher on the Detectify Crowdsource Platform. He’s passionate about security and found a way in through bug bounty programs. As an ethical hacker, he is naturally curious in security testing vendors which he is buying from and this time it led to bypassing IDOR protection using URL shorteners. In the following guest blog, he describes this security flaw that led him to access new client contracts on Jazztel’s platform.


Second Florida City Struck by Ransomware to Pay Off Hackers

A second Florida city has opted to pay a ransom demand to hackers after they took control of the city's municipal computer systems. On Tuesday, June 25, Lake City's Mayor announced that the city would pay hackers $460,000 to regain control of its email and other servers that were seized over two weeks ago.


Hackers Infiltrated NASA's Network Using Raspberry Pi

A report released by the NASA Office of Inspector General (OIG) claims hackers were able to infiltrate NASA's network using a vulnerable, unapproved Raspberry Pi in its April 2018 data breach. In the report, "Cybersecurity Management and Oversight at The Jet Propulsion Laboratory" officials claim that in the April attack, hackers stole over 500 MB of sensitive data.


10 Ways to Protect Your eCommerce Site From Hacking and Fraud

According to the Hacked Website Report by Sucuri, the number of websites getting compromised by hackers is increasing every year. The damage related to cybercrime is expected to hit $6 trillion by the end of 2020. If you are planning to launch an eCommerce website or already running a successful one, you must have to upgrade the security of your website regularly. Here, I am sharing some useful ways to keep your eCommerce site safe from hackers and fraudsters.


The Tax Paying Hacker: A Modern Phenomenon

In a dark room lit only by the light from four computer monitors sits a hacker named Hector (not his real name). You can hear the faint pulse of an EDM track coming from his headphones as Hector taps away on his computer’s keyboard. The above description could serve as the setting for a hacker movie set in the early 2000s. But it doesn’t work in today’s context. Nowadays, Hector sits in a brightly lit room with multiple screens at his disposal.

Protecting Your Company Website as an ERM Strategy

Your corporate website is more than just a business card since it is the most significant asset your organization holds for providing vital information to customers. A security breach on your company’s website from hackers can be devastating to your organization’s reputation amongst your clients. Exposing customer data to attackers impedes all efforts made to build a strong brand since customer trust is compromised.